[Audio] Hi. In this video we are going to see about use cases and misuse cases in I O T..
[Audio] Use case analysis using U M L Notation Use Case Diagrams . Oracle Unified Method framework, I B M Rational Unified Process framework , Software development process models , Requirements analyses..
[Audio] Security Issues For Which Use Cases Required In I o t. Boot process protection: Run Boot process initial programs. If it corrupts then then system fails. Secure software and firmware update: When Updating software and firmware then the secure updates needed . Stored data encryption and integrity protection: Needed Data storage protection from hackers..
[Audio] Platform integrity verification: Need the device platform integrity verification, else fake device platform communicates and the fake sends the command spoofing as the IoT device platform commands. Key generation, management and exchanges: Need security as these are prerequisite for authentication, authorisation and messages encryption..
[Audio] Authentication of sender and receiver must for secure message communication. Secured communication through a network. Lifecycle management..
[Audio] Misuse Cases. Firstly, identify the actors and collaborating actors. Develop Misuse Cases for each of them. Purpose: Creation of specifications for communicating the potential risks and rational. Security-relevant decisions to the device platform, application or service..
[Audio] Security Issues for which Misuse Cases Required In I O T. Identity Misuse Cases. Crypto offloads..
[Audio] Eavesdropping, Fake server , Fake device platform , Flooding of T C P or S Y N , Unaurthorised access to a data store , Audit and accountability..
[Audio] That's the end of it .Thank you for watching this video..